MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6feca5fff7a7a08ed572eed6241b0d07bc7b4cebe114e076be426badfc9e439b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



GuLoader


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 6feca5fff7a7a08ed572eed6241b0d07bc7b4cebe114e076be426badfc9e439b
SHA3-384 hash: 0c15dd08b828ae40a86a848c22fe008f4e229dc5245af4615cf8b59765c656fb1aa3a751a816ffd1661c2b4ecd846940
SHA1 hash: 68d19bd230b657db275ee5fb3dd27552bd5c9081
MD5 hash: 0dd563760b2166ddcc661759dfb62ec3
humanhash: oregon-oxygen-alaska-magnesium
File name:OOCS DI 20201156.exe
Download: download sample
Signature GuLoader
File size:90'112 bytes
First seen:2020-05-12 16:19:51 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 401496c24c0f17d805cb39fba6623b58 (5 x GuLoader)
ssdeep 768:w5s5v/msP2Xkt25aC9xAPRdCocqYr8EtHR9ZQ/VVU8NlB2Hx:75XmsP2Ut2fAPnFcqs8EnQNC86
Threatray 176 similar samples on MalwareBazaar
TLSH BE932A46B3D4F936E2528AF21B69AFA8155AFC301D41D94379C43F1D2B3AB12F42132B
Reporter abuse_ch
Tags:exe GuLoader


Avatar
abuse_ch
Malspam distributing GuLoader:

HELO: smarthost3-dkim.w-w.cz
Sending IP: 77.78.109.211
From: Lockett Chris <chris.lockett@woodside.com.au>
Subject: Re: Cracker Barrel - OOCS DI
Attachment: OOCS DI 20201156.iso (contains "OOCS DI 20201156.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
91
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-12 16:36:59 UTC
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
Suspicious use of SetWindowsHookEx
Suspicious use of NtSetInformationThreadHideFromDebugger
Checks QEMU agent state file
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

953ffd1fc492faf535fdc8293f713e31

GuLoader

Executable exe 6feca5fff7a7a08ed572eed6241b0d07bc7b4cebe114e076be426badfc9e439b

(this sample)

  
Dropped by
MD5 953ffd1fc492faf535fdc8293f713e31
  
Delivery method
Distributed via e-mail attachment

Comments